IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz 1

Quiz 1

1st - 12th Grade

15 Qs

Identifying devices

Identifying devices

12th Grade

11 Qs

Explorando Tinkercad en Secundaria

Explorando Tinkercad en Secundaria

7th Grade - University

10 Qs

INTRODUCCION A LA PROGRAMACION

INTRODUCCION A LA PROGRAMACION

6th Grade - University

10 Qs

BTEC Unit 1: HTTPS, SSL and TLS Quiz

BTEC Unit 1: HTTPS, SSL and TLS Quiz

12th Grade

15 Qs

To Change or Not to Change?

To Change or Not to Change?

12th Grade

10 Qs

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

11th - 12th Grade

10 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Ralph Ellis

Used 51+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential source(s) of network vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port number used for HTTP?

80

443

418

27

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of organisational vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of software vulnerabilities

Downloading software from untrustworthy sources

SQL injection

Zero-day vulnerabilities

Failing to enforce a password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continuing to use an older operating system, well after it is no longer being supported by the developer is an example of which type of vulnerability?

Operating system vulnerability

Software vulnerability

Network vulnerability

Organisational vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The largest vulnerability for mobile devices...

The time it takes for the original equipment manufacturer (OEM) to update that system software

Hackers accessing the mobile network signal.

Failure to support CSMA with RTS/CTS

Users' inability to secure their own deceives with passcodes.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of physical vulnerabilities

Downloading software from untrustworthy sources

Theft of equipment

Social engineering

Failing to enforce a password policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?